GE Healthcare
30+ Interview Questions and Answers
Q1. what is bug life cycle? which project management methodolgy are you following in your current project.
Bug life cycle is the process of identifying, reporting, fixing, retesting, and closing bugs in a software project.
Bug is identified by a tester during testing phase
Bug is reported to the development team
Development team fixes the bug
Tester retests the bug to ensure it is fixed
Bug is closed once confirmed fixed
Q2. What is the iterator, generator in python. Write an example of it. What is .pyc file, when is it generate, generate and show it.
Iterator and generator are used in Python to iterate over a sequence of elements. .pyc files are compiled Python files.
Iterator in Python is an object that enables a programmer to traverse a container, like a list.
Generator in Python is a function that returns an iterator. It generates values using the yield keyword.
Example of iterator: for num in range(5): print(num)
Example of generator: def square_numbers(n): for i in range(n): yield i*i
.pyc files are compiled Python files ...read more
Q3. Java 8, 11 features with coding assignment
Java 8 and 11 introduced several new features and improvements to the language.
Java 8 introduced lambda expressions, functional interfaces, streams, and default methods.
Java 11 introduced local variable syntax for lambda parameters, HTTP client API, and new string methods.
Example of Java 8 lambda expression: (x, y) -> x + y
Example of Java 11 HTTP client API: HttpClient client = HttpClient.newHttpClient();
Q4. What is call,bind,apply
call, bind, and apply are methods used to manipulate the value of 'this' in JavaScript functions.
Call invokes a function with a specified 'this' value and arguments provided individually.
Bind creates a new function that, when called, has its 'this' keyword set to the provided value.
Apply invokes a function with a specified 'this' value and arguments provided as an array.
All three methods are used to control the value of 'this' in a function.
Example: myFunction.call(thisValue,...read more
Q5. Explain about angular,nodejs,expressjs
Angular is a front-end framework, Node.js is a back-end runtime environment, and Express.js is a web application framework for Node.js.
Angular is used for building dynamic single-page applications (SPAs) with HTML, CSS, and TypeScript.
Node.js is used for building scalable network applications and is based on the V8 JavaScript engine.
Express.js is a minimal and flexible Node.js web application framework that provides a robust set of features for web and mobile applications.
Ang...read more
Q6. Array in descending order code
Sort an array of strings in descending order
Use the sort() method with a custom compare function to sort the array in descending order
Example: ['apple', 'banana', 'cherry'].sort((a, b) => b.localeCompare(a)) will result in ['cherry', 'banana', 'apple']
Q7. How do you manage conflicts within your functional teams during program management?
I encourage open communication and collaboration, identify the root cause of conflicts, and facilitate a resolution that benefits the program.
Encourage open communication and active listening to understand all perspectives
Identify the root cause of conflicts and address them directly
Facilitate a resolution that benefits the program and all parties involved
Document the conflict and resolution for future reference
Provide training and resources to prevent future conflicts
Q8. Aws full project flow chart
An AWS full project flow chart outlines the entire process of a project using AWS services.
Start with defining project requirements and goals
Design architecture using AWS services like EC2, S3, RDS, etc.
Implement the design by setting up resources and configuring services
Test the project to ensure functionality and performance
Deploy the project on AWS cloud
Monitor and maintain the project for optimal performance
Q9. How do you manage the resource who is underperforming?
Address underperformance through clear communication, identifying root causes, setting goals, and providing support.
Communicate expectations and provide feedback regularly
Identify the root cause of underperformance and address it
Set clear goals and provide support to achieve them
Offer training, coaching, or mentoring if necessary
Consider reassigning tasks or adjusting workload
Document performance issues and create a performance improvement plan
If necessary, initiate disciplin...read more
Q10. Write a code for heap sort algorithm and explain it?
Heap sort is a comparison-based sorting algorithm that uses a binary heap data structure.
Heap sort works by building a binary heap from the array and then repeatedly extracting the maximum element and placing it at the end of the array.
The heap is maintained as a complete binary tree, where each parent node is greater than or equal to its children.
The time complexity of heap sort is O(n log n) and it is an in-place sorting algorithm.
Heap sort is not stable, meaning that the r...read more
Q11. How did you handle sensitive parts and equipments on workshop.?
Q12. What are the Protocols in Industry. Like SPI,I2c, CAN
Common industry protocols include SPI, I2C, and CAN for communication between devices.
SPI (Serial Peripheral Interface) is a synchronous serial communication protocol commonly used for communication between microcontrollers and peripheral devices.
I2C (Inter-Integrated Circuit) is a multi-master, multi-slave serial communication protocol used for connecting low-speed peripherals to a motherboard or embedded system.
CAN (Controller Area Network) is a robust serial communication ...read more
Q13. What is safety and what is your first priority. ?
Q14. What is the Privacy considerations when building and deploying an application.
Q15. What is the security framework you would recommend for developing and deploying an application
Q16. Difference between call by value call by reference call by pointer
Call by value passes a copy of the variable, call by reference passes the actual variable, and call by pointer passes the memory address of the variable.
Call by value: Changes made to the parameter inside the function do not affect the original variable. Example: int x = 10; func(x);
Call by reference: Changes made to the parameter inside the function affect the original variable. Example: void func(int &x) { x = 20; }
Call by pointer: Passes the memory address of the variable....read more
Q17. What is the diff between Authentication and Authorization.
Q18. How to fix a specific problem related to the CT device
To fix a specific problem related to the CT device, follow these steps:
Identify the specific problem by observing the symptoms or error messages
Check the device's power supply and ensure it is properly connected
Restart the CT device and see if the problem persists
Consult the device's user manual or technical documentation for troubleshooting steps
Contact the manufacturer's technical support for further assistance
Q19. How failed jobs will be reprocessed?
Failed jobs can be reprocessed by identifying the root cause of failure, fixing the issue, and resubmitting the job.
Identify the reason for job failure by checking logs and error messages.
Fix the issue causing the failure, such as correcting code errors or resolving resource constraints.
Resubmit the job after making necessary changes to ensure successful processing.
Implement monitoring and alerting systems to proactively identify and address potential failures.
Consider implem...read more
Q20. Tell me more about design principles
Design principles are guidelines for creating software that is maintainable, scalable, and efficient.
Design principles help ensure that software is easy to modify and extend over time
They promote code reuse and reduce the likelihood of bugs and errors
Examples of design principles include SOLID, DRY, and KISS
SOLID stands for Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion
DRY stands for Don't Repeat Yourself
KISS stands fo...read more
Q21. What do you know about GE Healthcare?
GE Healthcare is a leading global provider of medical imaging, monitoring, biomanufacturing, and cell therapy technologies.
GE Healthcare offers a wide range of products and services in the healthcare industry
They specialize in medical imaging equipment such as MRI, CT, and ultrasound machines
GE Healthcare also provides solutions for monitoring patient vital signs and managing healthcare data
The company is involved in biomanufacturing processes and technologies for cell therap...read more
Q22. Loop in linked list and various scenario
Loop in linked list and various scenarios
A loop in a linked list occurs when a node points to a previous node in the list
Scenarios include detecting and removing loops, finding the length of the loop, and breaking the loop
Floyd's cycle-finding algorithm is commonly used to detect and remove loops
Q23. Calculation of pull up resistors in I2C?
Pull up resistors in I2C are used to ensure proper signal levels and prevent bus contention.
Pull up resistors are used to pull the signal lines high when they are not being actively driven low.
The value of the pull up resistors is typically around 2.2k ohms to 10k ohms.
The exact value of the pull up resistors depends on factors such as bus capacitance and speed requirements.
Pull up resistors are necessary for proper operation of I2C communication.
Example: For a standard I2C b...read more
Q24. C program to pass array in function
Passing array of strings in a C function
Declare the function prototype with array parameter
Pass the array as argument when calling the function
Access elements of the array within the function
Example: void printStrings(char *strings[], int size) { }
Q25. Type of inheritance, and explain
There are four types of inheritance in object-oriented programming: single, multiple, multilevel, and hierarchical.
Single inheritance: a class inherits from only one base class.
Multiple inheritance: a class inherits from more than one base class.
Multilevel inheritance: a class inherits from a class which in turn inherits from another class.
Hierarchical inheritance: multiple classes inherit from a single base class.
Q26. What is interrupt vector table
Interrupt vector table is a data structure that maps interrupt numbers to their corresponding interrupt service routines.
It is used in microcontrollers and operating systems to handle interrupts.
Each entry in the table contains the address of the interrupt service routine for a specific interrupt.
When an interrupt occurs, the processor looks up the corresponding entry in the table to find the address of the ISR to execute.
The table is typically located in a fixed memory locat...read more
Q27. What is 6 sigma
6 Sigma is a data-driven methodology for improving business processes and reducing defects.
It aims to achieve a level of quality where the probability of a defect is 3.4 parts per million or less.
It involves five phases: Define, Measure, Analyze, Improve, and Control (DMAIC).
It is widely used in industries such as manufacturing, healthcare, and finance.
It emphasizes on statistical analysis and measurement to identify and eliminate defects.
It requires a strong commitment from ...read more
Q28. Describe user testing for a product
User testing involves observing real users interacting with a product to gather feedback and improve usability.
Recruit a diverse group of users to represent the target audience
Create tasks for users to complete while being observed
Collect feedback through surveys, interviews, and observation
Iterate on the design based on user feedback
Use tools like usability testing software to track user interactions
Q29. Team handling for EPC Projects
Team handling for EPC Projects
Assigning tasks based on team member's strengths
Regular communication and feedback sessions
Encouraging collaboration and knowledge sharing
Monitoring progress and addressing issues promptly
Providing necessary resources and support
Ensuring adherence to project timelines and budget
Maintaining a positive and motivated team culture
Q30. On-premise to cloud data migration.
Data migration from on-premise to cloud involves transferring data from local servers to cloud-based storage systems.
Assess the current data infrastructure and identify the data to be migrated
Choose a suitable cloud storage solution based on requirements and budget
Plan the migration process including data extraction, transformation, and loading (ETL)
Test the migration process to ensure data integrity and security
Execute the migration during off-peak hours to minimize disrupti...read more
Q31. AC to DC converter circuit?
AC to DC converter circuit converts alternating current (AC) to direct current (DC) for powering electronic devices.
Uses diodes to rectify the AC signal into a pulsating DC signal
Includes a filter capacitor to smooth out the pulsations
May incorporate a voltage regulator to ensure a stable DC output
Common types include full-wave rectifiers and bridge rectifiers
Q32. What are Risks?
Risks are potential events or situations that could have negative impacts on a project's objectives.
Risks are uncertainties that can affect the success of a project.
They can be internal or external to the project.
Examples include budget overruns, schedule delays, resource constraints, and technical challenges.
Q33. add node at nth position
To add a node at the nth position in a linked list
Create a new node with the data to be inserted
Traverse the linked list to the (n-1)th node
Adjust the pointers to insert the new node at the nth position
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month